article thumbnail

Selling the C-suite on preemptive IT investments

CIO Business Intelligence

But disaster recovery is just one example of projects that are of an important and preemptive nature that CIOs want to fund but find de-prioritized when it comes to budget approval. Budgeting, Business Continuity, Data and Information Security, Disaster Recovery, IT Leadership, IT Strategy

article thumbnail

How to Overcome CloudSec Budget Constraints

Information Week

Director, Information Security at First National Technology Solutions, shares examples of how to apply your existing IT tools to work for your cloud security strategy. Robert LaMagna-Reiter, Sr.

Budget 65
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why IT leaders are putting more business spin on security spend

CIO Business Intelligence

Gartner projects that spending on information security and risk management products and services will grow 11.3% To better focus security spend, some chief information security officers (CISOs) are shifting their risk assessments from IT systems to the data, applications, and processes that keep the business going.

Security 111
article thumbnail

Aligning security and business strategies

CIO Business Intelligence

In times of economic downturn, for example, cybercrime may increase as people turn to illegal activities to make money. This is the time when many CFOs trawl through every line item in the budget, looking for potential savings. Cyber budgets must be spent wisely, often without increasing costs or targeting the most likely risks.

Strategy 105
article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. So an organization makes different strategies in implementing a security policy successfully. Get Management Support. Write Policies. Implement policies.

Policies 268
article thumbnail

Mount Sinai’s journey to secure health data in the cloud

CIO Business Intelligence

That training prompted Myers to make a number of security moves in preparation for moving Mount Sinai business and clinical applications to the cloud, including, in May 2021, recruiting chief information security officer Rishi Tripathi, whom Myers made sure was on Mount Sinai’s executive steering committee for the cloud.

Cloud 105
article thumbnail

People Skills Outweigh Technical Prowess in the Best Security Leaders

SecureWorld News

But it is vital as they fight for cybersecurity budget, try to explain risk, and explain the importance of line items such as security awareness training, blue, red and purple team exercises, and more. That's a soft skill that even the most adept CISOs are still trying to master.

Security 108